PHP remote file inclusion vulnerability in index.php in the Virii Info 1.10 and earlier module for Xoops allows remote attackers to execute arbitrary PHP code via a URL in the xoopsConfig[root_path] parameter. NOTE: the issue has been disputed by a reliable third party, stating that the application's checkSuperglobals function defends against the attack
References
Configurations
History
21 Nov 2024, 00:29
Type | Values Removed | Values Added |
---|---|---|
References | () http://osvdb.org/37429 - | |
References | () http://www.attrition.org/pipermail/vim/2007-April/001489.html - | |
References | () http://www.attrition.org/pipermail/vim/2007-April/001490.html - | |
References | () http://www.vupen.com/english/advisories/2007/1206 - | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/33368 - | |
References | () https://www.exploit-db.com/exploits/3642 - |
07 Nov 2023, 02:00
Type | Values Removed | Values Added |
---|---|---|
Summary | PHP remote file inclusion vulnerability in index.php in the Virii Info 1.10 and earlier module for Xoops allows remote attackers to execute arbitrary PHP code via a URL in the xoopsConfig[root_path] parameter. NOTE: the issue has been disputed by a reliable third party, stating that the application's checkSuperglobals function defends against the attack |
Information
Published : 2007-04-12 00:19
Updated : 2024-11-21 00:29
NVD link : CVE-2007-1976
Mitre link : CVE-2007-1976
CVE.ORG link : CVE-2007-1976
JSON object : View
Products Affected
xoops
- xoops_virii_info_module
CWE